Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection
暂无分享,去创建一个
Zahra Mobini | Chintha Tellambura | Mohammadali Mohammadi | Farnaz Feizi | C. Tellambura | Z. Mobini | M. Mohammadi | F. Feizi
[1] Chintha Tellambura,et al. Uplink/Downlink Rate Analysis and Impact of Power Allocation for Full-Duplex Cloud-RANs , 2018, IEEE Transactions on Wireless Communications.
[2] Rui Zhang,et al. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.
[3] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[4] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[5] Chau Yuen,et al. Low-Complexity End-to-End Performance Optimization in MIMO Full-Duplex Relay Systems , 2013, IEEE Transactions on Wireless Communications.
[6] W. Marsden. I and J , 2012 .
[7] Jiayin Qin,et al. Proactive Monitoring via Passive Reflection Using Intelligent Reflecting Surface , 2020, IEEE Communications Letters.
[8] Rui Zhang,et al. Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links , 2019, IEEE Transactions on Wireless Communications.
[9] Caijun Zhong,et al. Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.
[10] Baoyun Wang,et al. Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems , 2019, IEEE Transactions on Vehicular Technology.
[11] Quanzhong Li,et al. Robust Proactive Monitoring via Jamming With Deterministically Bounded Channel Errors , 2018, IEEE Signal Processing Letters.
[12] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.
[13] Ding Xu,et al. Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.
[14] Zhiguo Ding,et al. Proactive Eavesdropping Using UAV Systems with Full-Duplex Ground Terminals , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[15] Hongbo Zhu,et al. Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks , 2019, IEEE Access.
[16] Chintha Tellambura,et al. Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications , 2019, IEEE Transactions on Information Forensics and Security.
[17] George K. Karagiannidis,et al. On Secrecy Performance of Antenna-Selection-Aided MIMO Systems Against Eavesdropping , 2015, IEEE Transactions on Vehicular Technology.
[18] Inkyu Lee,et al. Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing , 2018, IEEE Transactions on Wireless Communications.
[19] MohammadAli Mohammadi,et al. Proactive Eavesdropping via Jamming in Full-duplex Cellular Networks with Antenna Selection , 2018, 2018 9th International Symposium on Telecommunications (IST).
[20] Neil Genzlinger. A. and Q , 2006 .
[21] Caijun Zhong,et al. Throughput Analysis and Optimization of Wireless-Powered Multiple Antenna Full-Duplex Relay Systems , 2016, IEEE Transactions on Communications.
[22] G.Neelima Usha Rani Jaggu. MULTI-ANTENNA WIRELESS LEGITIMATE SURVEILLANCE SYSTEMS: DESIGN AND PERFORMANCE ANALYSIS , 2019 .
[23] Jeffrey G. Andrews,et al. Mode Switching for the Multi-Antenna Broadcast Channel Based on Delay and Channel Quantization , 2008, EURASIP J. Adv. Signal Process..
[24] Daniel Pérez Palomar,et al. Fractional QCQP With Applications in ML Steering Direction Estimation for Radar Detection , 2011, IEEE Transactions on Signal Processing.
[25] Gábor Pataki,et al. On the Rank of Extreme Matrices in Semidefinite Programs and the Multiplicity of Optimal Eigenvalues , 1998, Math. Oper. Res..
[26] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[27] Jie Xu,et al. Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.
[28] Qi Zhang,et al. Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.
[29] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[30] Inkyu Lee,et al. Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems , 2017, IEEE Transactions on Information Forensics and Security.
[31] Yang-Seok Choi,et al. Full-Duplex Mobile Device - Pushing The Limits , 2014, ArXiv.
[32] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[33] A.F. Molisch,et al. MIMO systems with antenna selection , 2004, IEEE Microwave Magazine.
[34] Zhiguo Ding,et al. Antenna Selection in Full-Duplex Cooperative NOMA Systems , 2018, 2018 IEEE International Conference on Communications (ICC).
[35] Taneli Riihonen,et al. Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.
[36] Geoffrey Ye Li,et al. Joint Beamforming and Jamming Design for mmWave Information Surveillance Systems , 2018, IEEE Journal on Selected Areas in Communications.
[37] Sachin Katti,et al. Full Duplex MIMO Radios , 2014, NSDI.
[38] Joseph Lipka,et al. A Table of Integrals , 2010 .
[39] Caijun Zhong,et al. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.
[40] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[41] Daniel Pérez Palomar,et al. Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.
[42] Qi Zhang,et al. Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.
[43] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[44] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.